473,656 Members | 2,921 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

? User level security glitch

Using Access 2000 and 2002

Have set up user-level security with a new .mdw file (secured.mdw).

I open my database with a short cut whose target includes a command line option
for the workgroup .mdw file. This seems to work for the user-level security.

However, if I go directly (through Explorer) to the Access .mdb file of my
program (Program.mdb) and double click to start this .mdb file, the program
opens without any security!!

This does not seem like very good security to me. Is there any way to associate
my .mdb program with that .mdw file no matter how I choose to open my program?

Thank you for the help in advance.
Nov 12 '05 #1
13 2132
MFS 43 wrote:
Using Access 2000 and 2002

Have set up user-level security with a new .mdw file (secured.mdw).

I open my database with a short cut whose target includes a command line option
for the workgroup .mdw file. This seems to work for the user-level security.

However, if I go directly (through Explorer) to the Access .mdb file of my
program (Program.mdb) and double click to start this .mdb file, the program
opens without any security!!

This does not seem like very good security to me. Is there any way to associate
my .mdb program with that .mdw file no matter how I choose to open my program?

Thank you for the help in advance.


First thing about security is not let "admin" have any rights as this is
the default login. You can use the workgroup administrator to set the
default mdw to your secured one but this will only work for your machine.

Some light reading for you
http://support.microsoft.com/default...ent/secfaq.asp
or http://tinyurl.com/4tye if the above wraps.
--
But why is the Rum gone?
Nov 12 '05 #2

"MFS 43" <mf***@aol.co m> wrote in message
news:20******** *************** ****@mb-m20.aol.com...
Using Access 2000 and 2002

Have set up user-level security with a new .mdw file (secured.mdw).

I open my database with a short cut whose target includes a command line option for the workgroup .mdw file. This seems to work for the user-level security.

However, if I go directly (through Explorer) to the Access .mdb file of my
program (Program.mdb) and double click to start this .mdb file, the program
opens without any security!!

This does not seem like very good security to me. Is there any way to associate my .mdb program with that .mdw file no matter how I choose to open my program?


Yeah, start over and do it correctly :-). This is a classic sign that you
didn't.
--
I don't check the Email account attached
to this message. Send instead to...
RBrandt at Hunter dot com
Nov 12 '05 #3
I have done that. I have taken all the rights away from Admin in my secured
..mdw file and succesfully created an .mdw file.

As you mentioned I can change my default .mdw for my machine. I believe this is
done by changes in the registry.

But whether I change the registry on my machine or use an icon whose target
includes my .mdw file there is a simple way to "break" the security.

If I change the registry, all that needs to be done is change the registry back
to system.mdw.

If I start with an icon specifying an .mdw file, you can get around this by
starting the program without the icon i.e. by clicking directly on the program
file name (.mdb) in Explorer.

There must be a way to prevent this. I can't believe Microsoft has created a
security system that is so easy to get through.

Thanks for your help.
Nov 12 '05 #4
If this is a "classic sign", I will start over.

Thanks for the help.
Nov 12 '05 #5
MFS 43 wrote:
I have done that. I have taken all the rights away from Admin in my secured
.mdw file and succesfully created an .mdw file.

As you mentioned I can change my default .mdw for my machine. I believe this is
done by changes in the registry.
Well, easier than that, Tools->Security->Workgroup Administrator
But whether I change the registry on my machine or use an icon whose target
includes my .mdw file there is a simple way to "break" the security.

If I change the registry, all that needs to be done is change the registry back
to system.mdw.

If I start with an icon specifying an .mdw file, you can get around this by
starting the program without the icon i.e. by clicking directly on the program
file name (.mdb) in Explorer.

There must be a way to prevent this. I can't believe Microsoft has created a
security system that is so easy to get through.


If you had removed Admin's rights then double clicking on the MDB file
would yield no access into the database. Unless I'm mistaken as I
haven't used Access' security in a long time as I tend to use MDEs for
front end and SQL Server for the back-end.

--
But why is the Rum gone?
Nov 12 '05 #6
You're correct.

I have redone the Security Wizard and the database seems secure now but I can't
open the program by clicking on the MDB file OR by opening access and then
choosing my program. It never gives me a chance to sign in.

The way I can get in is with an icon with a commnd line option identifying the
MDW file. This is OK but then I don't know how I could get in if I wanted to
open the file exclusively.
Nov 12 '05 #7
I have redone the Security Wizard and the database seems VERY secure now but I
can't open the program by clicking on the MDB file OR by opening access and
then choosing my program. It never gives me a chance to sign in.

The way I can get in is with an icon with a commnd line option identifying the
MDW file. This is OK but then I don't know how I could get in if I wanted to
open the file exclusively.
Nov 12 '05 #8
MFS 43 wrote:
You're correct.
<trumpet method=blow owner=me>
Of course!!!
</trumpet>
I have redone the Security Wizard and the database seems secure now but I can't
open the program by clicking on the MDB file OR by opening access and then
choosing my program. It never gives me a chance to sign in.

The way I can get in is with an icon with a commnd line option identifying the
MDW file. This is OK but then I don't know how I could get in if I wanted to
open the file exclusively.


Isn't there a /excl or something command line argument? You could put
that into a shortcut.

--
Error reading sig - A)bort R)etry I)nfluence with large hammer
Nov 12 '05 #9
MFS 43 wrote:
You're correct.
<trumpet method=blow owner=me>
Of course!!!
</trumpet>
I have redone the Security Wizard and the database seems secure now but I can't
open the program by clicking on the MDB file OR by opening access and then
choosing my program. It never gives me a chance to sign in.

The way I can get in is with an icon with a commnd line option identifying the
MDW file. This is OK but then I don't know how I could get in if I wanted to
open the file exclusively.


Isn't there a /excl or something command line argument? You could put
that into a shortcut.

--
Error reading sig - A)bort R)etry I)nfluence with large hammer
Nov 12 '05 #10

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
4366
by: intl04 | last post by:
Are there any problems with multiple user access to the same Access database on a shared network drive? I have 'shared' chosen for 'default open mode'. As for the record locking properties, I selected 'edited record' for default record locking; also, 'Open databases using record-level locking' is checked. We seemed to experience difficulties in this office - just once so far, I think - with more than one user accessing the database on a...
12
395
by: MFS 43 | last post by:
Using Access 2000 and 2002 Have set up user-level security with a new .mdw file (secured.mdw). I open my database with a short cut whose target includes a command line option for the workgroup .mdw file. This seems to work for the user-level security. However, if I go directly (through Explorer) to the Access .mdb file of my program (Program.mdb) and double click to start this .mdb file, the program opens without any security!!
2
3178
by: Phil Townsend | last post by:
I have been attempting to persuade our systems admin staff to allow us to use integrated security by adding the aspnet user to SQL Server. Currently we are forced to use a connection string that passes user names/passwords on the conncetion string itself. i know that using integrated security is a more secure way of doing this. However, our systems admin is saying that this is not poosible on our current configuration of Win2000 and IIS...
5
2056
by: Norsoft | last post by:
I have a .Net 1.1 application which is downloaded into an aspx page. It is a dll which inherits from System.Windows.Forms.UserControl. It works fine on a PC with only the 1.1 Framework. However, the control will not load on a PC with the 2.0 Framework installed. I know that IE will use the newest framework so I assume it is a security issue. At the assembly level I apply the following attributes;
1
2664
by: Friends | last post by:
Hi I need to set security for row level but not based on Database user's login. It should be based on the user table login. For the particular user I need to allow only the particular records to access insert, update delete and select. Let me explain clearly For example think we are using asp/asp.net website
33
11841
by: JamesB | last post by:
I am writing a service that monitors when a particular app is started. Works, but I need to get the user who is currently logged in, and of course Environment.UserName returns the service logon (NT_AUTHORITY\SYSTEM). I understand that when the service starts, no user may be logged in, but that's ok, as the app I am monitoring can only be run by a logged in user. Do I need to use WMI to get the user context of Explorer.exe or is there a...
2
4032
by: evenlater | last post by:
I realize that user level security is not available for Access databases in the new AK27 format .accdb, and I know that I can still utilize ULS by making my database an .mdb file. But I'm wondering WHY Microsoft is scrapping a feature that I've always found to be extremely useful. Surely they don't expect that users of the new database format will no longer have a need to assign permissions at different levels for different users! Why...
4
5804
by: =?Utf-8?B?QXZhRGV2?= | last post by:
ASP.Net 2. We are migrating to Windows 2008 64 bit Server with IIS 7 from Windows 2003 32 Bit with IIS 6. A few library classes we wrote uses impersonation in code like explained in this article: http://support.microsoft.com/?id=306158#4 This doesn't work in Windows 2008 Server, we receive the following exception:
6
2101
by: plaguna | last post by:
Basically I have Three questions about Jet U-L Security: 1.Every time I create new Groups, new Users and Permissions using the User and Group Accounts dialog box, It creates User security for every single DB Access file I have in my system. How can I get a Jet User-Level Security only for the current opened file without using the User-Level Security Wizard?. 2. Also, Is there a way to view and make changes to Groups and Users opening...
0
8297
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
8717
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
8498
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
8600
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
7311
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
6162
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
4150
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
2726
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
2
1600
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.